A dynamic cyber insurance solution
Dattak advantages
Cyber analysis
Use Dattak's cybersecurity scan and audit to quantify your risk exposure and identify the cybersecurity flaws jeopardising your business.
Experts
The best cybersecurity and insurance experts are available to answer your questions and help you in the event of a claim.

Cyber insurance
Depending on your company's risk profile, we can offer you a tailored, simple and comprehensive cyber insurance policy.
Risk prevention
Benefit from prevention tools such as our free phishing simulator and comprehensive documentation to train your teams in cyber risk.

Cyber analysis
Use Dattak's cybersecurity scan and audit to quantify your risk exposure and identify the cybersecurity flaws jeopardising your business.
Experts
The best cybersecurity and insurance experts are available to answer your questions and help you in the event of a claim.
Cyber insurance
Depending on your company's risk profile, we can offer you a tailored, simple and comprehensive cyber insurance policy.
Risk prevention
Benefit from prevention tools such as our free phishing simulator and comprehensive documentation to train your teams in cyber risk.
The most comprehensive cyber insurance cover on the market
Protect your business with a comprehensive cyber insurance solution and benefit from the best possible support in the event of a claim.
Our insurance cover
Working with strong risk carriers, we have developed a tailor-made cyber insurance product specifically adapted to the needs of each company.
Assistance and Expertise
Contributions from experts
Our experts can support you on all fronts: engineers, cybersecurity experts, legal experts, crisis management, etc.
Contributions from experts
Our experts can support you on all fronts: engineers, cybersecurity experts, legal experts, crisis management, etc.
Example
Your company is the victim of a cyber attack, with criminals breaking into your computer system. Our experts will help you to resolve the problem.
24/7 emergency hotline
We provide you with an emergency number to help you in the event of an attack. An expert is dispatched within the hour to coordinate incident management.
24/7 emergency hotline
We provide you with an emergency number to help you in the event of an attack. An expert is dispatched within the hour to coordinate incident management.
Example
In the event of malicious intrusion into the computer system or suspected intrusion, our incident response service will deal with your request 24 hours a day, 7 days a week.
Damage and loss
Business Interruption
We cover your loss of gross operating margin following the total or partial interruption of your IT system.
Business Interruption
We cover your loss of gross operating margin following the total or partial interruption of your IT system.
Example
Your company is the victim of a cyber-attack, and you are forced to shut down all or part of your IT system to limit the damage. We cover your loss of gross operating margin. In other words, the gross margin you should have achieved during the period of interruption.
Cyber Fraud
We cover the financial consequences of cyber-fraud committed against you through proven malicious intrusion.
Cyber Fraud
We cover the financial consequences of cyber-fraud committed against you through proven malicious intrusion.
Example
Your company is the victim of a cyber-attack. The criminals break into your computer system and send an e-mail to your finance manager asking him to issue a bank transfer. We then take over responsibility for the misappropriated funds.
Telephone overbilling
We cover the extra costs incurred by fraudulent use of your telephone lines as a result of malicious intrusion.
Telephone overbilling
We cover the extra costs incurred by fraudulent use of your telephone lines as a result of malicious intrusion.
Example
Your company is the victim of a cyber attack, and the criminals use your phone lines to call premium-rate numbers. We take care of the extra costs.
Notification costs
We cover the costs of notifying the authorities and the persons concerned in the event of theft of personal data.
Notification costs
We cover the costs of notifying the authorities and the persons concerned in the event of theft of personal data.
Example
If your company is the victim of a cyber attack, you are obliged to notify all your customers affected by the attack, as well as the CNIL.
Cost of rebuilding your IT system
We will cover the cost of restoring your information systems to working order.
Cost of rebuilding your IT system
We will cover the cost of restoring your information systems to working order.
Example
Following a cyber attack, your company's IT system is affected. We cover all the costs involved in restoring it to the same working order as before the attack.
Cost of restoring your data
We cover the cost of reconstituting the data on your usable back-ups.
Cost of restoring your data
We cover the cost of reconstituting the data on your usable back-ups.
Example
Following a cyber attack, your company's data is affected. We cover all the costs involved in restoring your data.
Monitoring and surveillance costs
We cover the costs incurred in detecting the improper use of personal data.
Monitoring and surveillance costs
We cover the costs incurred in detecting the improper use of personal data.
Example
Your customers' data leaks, and this data includes sensitive information and/or information that directly or indirectly identifies a customer. We then incur costs to ensure that this data is not used for malicious purposes.
Additional operating costs
We cover the costs incurred to limit your loss of gross operating margin following the interruption of your IT system.
Additional operating costs
We cover the costs incurred to limit your loss of gross operating margin following the interruption of your IT system.
Example
If you incur costs to limit your operating loss following a malicious intrusion. We will cover these costs.
Investigation costs and administrative penalties
We will cover the costs of investigations brought against you by a competent administrative or governmental authority in respect of a personal data breach or following a failure to comply with PCI DSS security rules.
Investigation costs and administrative penalties
We will cover the costs of investigations brought against you by a competent administrative or governmental authority in respect of a personal data breach or following a failure to comply with PCI DSS security rules.
Example
Following a cyber attack, your customers' personal data leaks out and the CNIL launches an investigation against you.
Cyber liability
Cyber Liability
We cover the financial consequences and/or defense costs resulting from any claim lodged by a third party.
Cyber Liability
We cover the financial consequences and/or defense costs resulting from any claim lodged by a third party.
Example
Your company is the victim of a cyber-attack and one of your customers' personal data is leaked, or you transmit a virus to a third party. In this case, we take charge of all defense costs (claims management, legal fees, etc.).
Media Liability
We cover the costs and expenses of defending any claim brought by a third party following the disclosure of confidential and/or compromising information in the media.
Media Liability
We cover the costs and expenses of defending any claim brought by a third party following the disclosure of confidential and/or compromising information in the media.
Example
Your company is the victim of an attack and confidential information about a partner is leaked to the press. We cover the costs resulting from any third-party claim.

Solid risk carriers recognised for their expertise
A comprehensive response in the event of a cyber attack
In the event of a cyber attack, our teams are at your disposal and will respond immediately. The faster the response, the less damage there will be!
24/7 support
In the event of malicious intrusion into an insured party's IT system. A crisis expert is assigned to the policyholder within the hour to help manage the incident.
The best experts
In the event of a malicious intrusion, our policyholders benefit from the support of the best IT, legal and crisis management experts.
Compensation
Once the attack has been contained, we compensate our policyholders within a few days. What's more, they will be notified every time their claim is processed.
Interested in Dattak?
Become a partner broker
Protect your customers with the best cyber insurance offer
Contact a broker
Protect your business with the best cyber insurance offer